DEFENDING AGAINST VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS
暂无分享,去创建一个
Wireless sensor network is a one main issue in wireless ad-hoc sensor network is wastage of energy at each sensor nodes. Energy is the one most important factor while considering sensor nodes. Wireless sensor networks require solution for conserving energy level. One new type of attack called vampire attacks, which occurring at network layer. It leads to resource depletion (energy) at each sensor nodes, by destroying battery power of any node. It transmits a small complaint messages to disable a whole network, hence it is very difficult to detect and prevent. Existing protocols are not focusing on this vampire attack happening on routing layer, hence there exist two types of attacks namely, carousel and stretch attack. Hence there is a large of energy loss. New protocol called VSP, a valuable and secure protocol is proposed along with the key management protocol to avoid this vampire attack. By using this, existing problems can be overcome. The existing system does not offer a fully satisfactory solution for Vampire attacks during the topology discovery phase, but suggested some intuition about damage limitations possible with further modifications to PLGPa. The system proposed defenses against some of the forwarding-phase attacks and described VSP, the first sensor network routing protocol that provably bounds damage from Vampire attacks by verifying that packets consistently make progress toward their destinations. The proposed system introduces a novel authentication and key management mechanism called Hybrid Key Management. It is robust and scalable under limited memory constraints. It ensures strong security guarantees by using Low Power Routing (RPL).The proposed system avoids vampire attack by Elliptic curve Diffie-Hellman algorithm for authentication and Modified RSA algorithm for data Encryption.
[1] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[2] Daniel Minoli,et al. Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .